Hacking Car Computers
A new level of danger. In Vehicle Informant (IVI Computers) are being hacked with deadly results. “Two hackers have developed a tool...
Internal IT, The Risks
I found this story interesting because it was about an internal IT employee. For supporting the company employees, he was given the...
Cisco Security Webinars On-Demand
The Ransomware Threat: New Tactics and how to fight back The rise of ransomware has become one of the most widespread and financially...
Muni Hit by Ransomware Attack
I just heard the on the news about San Francisco Muni was impacted by a Ransomware attack. I first heard of it on TV news. They did not...
Backdoors Found in Barracuda Gear
EndFragment"Even the biggest companies can have flaws that are so simply dumb that it just might be the one move to bring the company to...
TU Security is Everyone's Responsibility
Discussion is every IT job a cyber security job? Do we need to change the way people think about cyber security when it comes to career...
Cybersecurity Workforce and Career Tools
StartFragment The NICE Program Office is pleased to announce that the NIST Special Publication 800-181: The NICE Cybersecurity Workforce...
Worlds Largest Data Breaches Active Info-graphic
Here is an awesome visual graphic of the time and size of data breaches going back to 2004. It is an interactive graphic that you can...
TU DDoS and IoT
On 21 OCT 2016 one of the largest scale Distributed Denial of Service (DDoS) attacks was launched against US based websites. One of the...
Insecure OS X
A well-known security hole in later versions of Apple OSX allows users to boot into recovery mode and reset the admin or root password. ...